{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:47:37Z","timestamp":1729633657545,"version":"3.28.0"},"publisher-location":"Reston, Virigina","reference-count":32,"publisher":"American Institute of Aeronautics and Astronautics","content-domain":{"domain":["arc.aiaa.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,19]]},"DOI":"10.2514\/6.2012-2401","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T22:53:44Z","timestamp":1355871224000},"update-policy":"http:\/\/dx.doi.org\/10.2514\/aiaa_crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Decision Fusion Methods With Applications to Structural Health Monitoring"],"prefix":"10.2514","author":[{"given":"Saleh","family":"Zein-Sabatto","sequence":"first","affiliation":[{"name":"Tennessee State University"}]},{"given":"Maged","family":"Mikhail","sequence":"additional","affiliation":[{"name":"Tennessee State University"}]},{"given":"Mohammad","family":"Bodruzzaman","sequence":"additional","affiliation":[{"name":"Tennessee State University"}]},{"given":"Martin","family":"DeSimio","sequence":"additional","affiliation":[{"name":"University of Dayton Research Institute"}]}],"member":"1387","published-online":{"date-parts":[[2012,9,6]]},"reference":[{"key":"p_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.776625"},{"volume-title":"``Statistical Damage Identification Techniques Applied to the I-40 Bridge over the Rio Grande,''Inthe International Modal Analysis Conference","year":"1998","author":"Doebling S.","key":"p_2"},{"key":"p_3","doi-asserted-by":"publisher","DOI":"10.1109\/34.824819"},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2006.275689"},{"key":"p_19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48219-9_8"},{"key":"p_20","first-page":"429","volume-title":"Conference onInformationFusion, Fusion'99","volume":"1","author":"Hall D."},{"key":"p_21","first-page":"4","volume-title":"Proceedingsofthe Second International Conference onInformationFusion, Fusion'99","volume":"1","author":"Hatch M."},{"volume-title":"An Introduction to Bayesian and Dempster-Shafer Data Fusion","year":"2005","author":"Koks D.","key":"p_22"},{"key":"p_23","doi-asserted-by":"publisher","DOI":"10.1109\/4235.887233"},{"key":"p_24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45712-7_70"},{"key":"p_25","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994110"},{"volume-title":"Doctor ofPhilosophyDissertation inComputer Science, the Universityof California","year":"2002","author":"Murphy K. P.","key":"p_26"},{"key":"p_27","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1111\/j.2517-6161.1968.tb00722.x","volume":"30","author":"Dempster A. P.","year":"1968","journal-title":"Journal of the Royal Statistical Society, Series B"},{"volume-title":"AMathematicalTheoryofEvidence","year":"1976","author":"Shafer G.","key":"p_28"},{"key":"p_29","first-page":"1","volume":"3","author":"Shafer G.","year":"1990","journal-title":"International Journalof Approximate Reasoning"},{"key":"p_30","unstructured":"16Shafer,G.,andPearl,J.\"ReadingsinUncertainReasoning,\"MorganKaufmann,1990."},{"key":"p_31","doi-asserted-by":"publisher","DOI":"10.1117\/1.601267"},{"key":"p_32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.1997.628514"},{"key":"p_33","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1994.374718"},{"issue":"12","key":"p_34","first-page":"1795","volume":"24","author":"Giacinto G.","year":"2003","journal-title":"PatternRecognition Letters"},{"issue":"1","key":"p_35","volume":"34","author":"Su J.","year":"2004","journal-title":"IEEE Trans. System ManCybernetics, Part B"},{"key":"p_36","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(03)00119-2"},{"key":"p_37","doi-asserted-by":"publisher","DOI":"10.1109\/5.949484"},{"key":"p_38","doi-asserted-by":"publisher","DOI":"10.1049\/cce:19950202"},{"volume-title":"ComputationalIntelligentanIntroduction","year":"2003","author":"Andries P.E.","key":"p_39"},{"key":"p_40","first-page":"1","volume-title":"Computing and Information Systems","author":"Dymitr R.","year":"2000"},{"key":"p_41","first-page":"10","volume":"1","author":"Mendel J.","year":"2003","journal-title":"IEEE Connections, Newsletter of the IEEE Neural NetworksSociety"},{"issue":"4","key":"p_42","first-page":"771","volume":"4","author":"Castillo O.","year":"2008","journal-title":"Informationand Control"},{"issue":"2","key":"p_43","first-page":"185","volume":"20","author":"Fang J.","year":"1997","journal-title":"Journal ofPetroleumGeology"},{"volume-title":"The Second Data Generation Program-DGP\/2","author":"Benedict P.","key":"p_44"},{"key":"p_45","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2010.5548298"},{"key":"p_46","doi-asserted-by":"publisher","DOI":"10.1177\/1475921706058007"}],"event":{"name":"Infotech@Aerospace 2012","location":"Garden Grove, California"},"container-title":["Infotech@Aerospace 2012"],"original-title":[],"link":[{"URL":"http:\/\/arc.aiaa.org\/doi\/pdf\/10.2514\/6.2012-2401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T14:17:07Z","timestamp":1714745827000},"score":1,"resource":{"primary":{"URL":"https:\/\/arc.aiaa.org\/doi\/10.2514\/6.2012-2401"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,19]]},"references-count":32,"alternative-id":["10.2514\/6.2012-2401","10.2514\/MIAA12"],"URL":"https:\/\/doi.org\/10.2514\/6.2012-2401","relation":{},"subject":[],"published":{"date-parts":[[2012,6,19]]}}}